Handbook of Applied Cryptography
Handbook of Applied Cryptography
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Proceedings of the First International Workshop on Information Hiding
Proceedings of the First International Workshop on Information Hiding
Proceedings of the Third International Workshop on Information Hiding
IH '99 Proceedings of the Third International Workshop on Information Hiding
Critical analysis of security in voice hiding techniques
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
A Secure Subliminal Channel (?)
CRYPTO '85 Advances in Cryptology
Proceedings of the First International Workshop on Information Hiding
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals
Proceedings of the First International Workshop on Information Hiding
An Information-Theoretic Approach to Steganography and Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
On a special class of broadcast channels with confidential messages
IEEE Transactions on Information Theory
On the limits of steganography
IEEE Journal on Selected Areas in Communications
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Capacity is the wrong paradigm
Proceedings of the 2002 workshop on New security paradigms
Towards a new paradigm for securing wireless sensor networks
Proceedings of the 2003 workshop on New security paradigms
Cyber warfare: steganography vs. steganalysis
Communications of the ACM - Voting systems
Senary Huffman compression - a reversible data hiding scheme for binary images
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Syntax and semantics-preserving application-layer protocol steganography
IH'04 Proceedings of the 6th international conference on Information Hiding
Information hiding method using CDMA on wave files
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Provably secure steganography with imperfect sampling
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Hi-index | 0.00 |